Editing Illegal Entry Protocols

From Halopedia, the Halo wiki

You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 3: Line 3:


==Overview==
==Overview==
By [[2521]], [[United Nations Space Command|UNSC]] military operating systems had been standardized for over the last seventy years, leaving them vulnerable to [[Insurrectionist]] hacking. This stood in contrast to the [[Outer Colony]] networks used by the insurgents: as makeshift software, they were much more heterogeneous in nature and thus more difficult for the UNSC to decipher. There were several incidents in which UNSC systems had been hacked by rebel forces, the most prominent being the [[UNSC destroyer|destroyer]] {{UNSCShip|Persephone}}. This prompted Dr. Halsey to create new security protocols for the UNSC.{{Ref/Reuse|journal21}}
By [[2521]], [[United Nations Space Command|UNSC]] military operating systems had been standardized for over the last seventy years, leaving them vulnerable to [[Insurrectionist]] hacking. This stood in contrast to the [[Outer Colony]] networks used by the insurgents: as makeshift software, they were much more heterogeneous in nature and thus more difficult for the UNSC to decipher. There were several incidents in which UNSC systems had been hacked by rebel forces, the most prominent being the [[UNSC destroyer|destroyer]] {{UNSCShip|Persephone}}. This prompted Dr. Halsey to create new security protocols for the UNSC.<ref name="journal21"/>


Based on already existing translation algorithms, the Illegal Entry Protocols were created by Dr. Halsey primarily for use in third-generation [[smart AI]]s. This new crop of intellect would allow them to penetrate any system software. A side effect of the protocol was that the AIs could learn to mutate and defend established UNSC operations systems from attacks.{{Ref/Reuse|journal21}} Later, the protocols were used by AIs to reverse-engineer [[Covenant]] technology, namely the [[energy shielding]] of the [[Kig-Yar point defense gauntlet]].<ref>'''[[Dr. Halsey's personal journal]]''', ''May 20, 2544''</ref>
Based on already existing translation algorithms, the Illegal Entry Protocols were created by Dr. Halsey primarily for use in third-generation [[smart AI]]s. This new crop of intellect would allow them to penetrate any system software. A side effect of the protocol was that the AIs could learn to mutate and defend established UNSC operations systems from attacks.<ref name="journal21"/> Later, the protocols were used by AIs to reverse-engineer [[Covenant]] technology, namely the [[energy shielding]] of the [[Kig-Yar point defense gauntlet]].<ref>'''[[Dr. Halsey's personal journal]]''', ''May 20, 2544''</ref>


To Dr. Halsey's chagrin, the Illegal Entry Protocols and Counter-Illegal Entry Protocols soon gained the nicknames "PIE" and "C-PIE", respectively, derived from misspellings of their acronyms.{{Ref/Reuse|journal21}}
To Dr. Halsey's chagrin, the Illegal Entry Protocols and Counter-Illegal Entry Protocols soon gained the nicknames "PIE" and "C-PIE", respectively, derived from misspellings of their acronyms.<ref name="journal21"/>


==List of appearances==
==List of appearances==

Please note that all contributions to Halopedia are considered to be released under the Attribution-ShareAlike 3.0 Unported license (see Halopedia:Copyrights for details). If you don't want your writing to be edited mercilessly and redistributed at will, then don't submit it here. You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)

To view or search uploaded images go to the list of images. Uploads and deletions are also logged in the upload log. For help including images on a page see Help:Images. For a sound file, use this code: [[Media:File.ogg]].

Do not copy text from other websites without permission. It will be deleted.

Templates used on this page: